mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-08-07 17:49:17 +00:00
Merge branch 'develop' into fix/MNT-17971_activiti_signalAndBoundaryEvent
This commit is contained in:
4
.gitbugtraq
Normal file
4
.gitbugtraq
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
# For SmartGit
|
||||||
|
[bugtraq "jira"]
|
||||||
|
url = https://issues.alfresco.com/jira/browse/%BUGID%
|
||||||
|
logRegex = ([A-Z]+-\\d+)
|
3
pom.xml
3
pom.xml
@@ -43,6 +43,7 @@
|
|||||||
<dependency.alfresco-data-model.version>6.18</dependency.alfresco-data-model.version>
|
<dependency.alfresco-data-model.version>6.18</dependency.alfresco-data-model.version>
|
||||||
<dependency.alfresco-jlan.version>6.3</dependency.alfresco-jlan.version>
|
<dependency.alfresco-jlan.version>6.3</dependency.alfresco-jlan.version>
|
||||||
<dependency.alfresco-pdf-renderer.version>1.0</dependency.alfresco-pdf-renderer.version>
|
<dependency.alfresco-pdf-renderer.version>1.0</dependency.alfresco-pdf-renderer.version>
|
||||||
|
<dependency.alfresco-hb-data-sender.version>1.0.1</dependency.alfresco-hb-data-sender.version>
|
||||||
|
|
||||||
|
|
||||||
<dependency.spring.version>3.2.17.RELEASE</dependency.spring.version>
|
<dependency.spring.version>3.2.17.RELEASE</dependency.spring.version>
|
||||||
@@ -99,7 +100,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.alfresco</groupId>
|
<groupId>org.alfresco</groupId>
|
||||||
<artifactId>alfresco-heartbeat-data-sender</artifactId>
|
<artifactId>alfresco-heartbeat-data-sender</artifactId>
|
||||||
<version>1.0.0</version>
|
<version>${dependency.alfresco-hb-data-sender.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.sun.mail</groupId>
|
<groupId>com.sun.mail</groupId>
|
||||||
|
@@ -3098,12 +3098,13 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Boolean isOnWorkingCopy = checkOutCheckInService.isWorkingCopy(nodeRef);
|
||||||
Updatability updatability = propDef.getPropertyDefinition().getUpdatability();
|
Updatability updatability = propDef.getPropertyDefinition().getUpdatability();
|
||||||
if ((updatability == Updatability.READONLY)
|
if (!isUpdatable(updatability, isOnWorkingCopy))
|
||||||
|| (updatability == Updatability.WHENCHECKEDOUT && !checkOutCheckInService.isWorkingCopy(nodeRef)))
|
|
||||||
{
|
{
|
||||||
throw new CmisInvalidArgumentException("Property " + property.getId() + " is read-only!");
|
throw new CmisInvalidArgumentException("Property " + propertyId + " is read-only!");
|
||||||
}
|
}
|
||||||
|
|
||||||
TypeDefinitionWrapper propType = propDef.getOwningType();
|
TypeDefinitionWrapper propType = propDef.getOwningType();
|
||||||
Serializable value = getValue(property, propDef.getPropertyDefinition().getCardinality() == Cardinality.MULTI);
|
Serializable value = getValue(property, propDef.getPropertyDefinition().getCardinality() == Cardinality.MULTI);
|
||||||
Pair<TypeDefinitionWrapper, Serializable> pair = new Pair<TypeDefinitionWrapper, Serializable>(propType, value);
|
Pair<TypeDefinitionWrapper, Serializable> pair = new Pair<TypeDefinitionWrapper, Serializable>(propType, value);
|
||||||
@@ -3129,7 +3130,7 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
|
|
||||||
for (String propertyId : propsMap.keySet())
|
for (String propertyId : propsMap.keySet())
|
||||||
{
|
{
|
||||||
if(propertyId.equals(PropertyIds.SECONDARY_OBJECT_TYPE_IDS))
|
if (propertyId.equals(PropertyIds.SECONDARY_OBJECT_TYPE_IDS))
|
||||||
{
|
{
|
||||||
// already handled above
|
// already handled above
|
||||||
continue;
|
continue;
|
||||||
@@ -3213,39 +3214,12 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
for(QName aspectQName : aspectsToRemove)
|
for(QName aspectQName : aspectsToRemove)
|
||||||
{
|
{
|
||||||
nodeService.removeAspect(nodeRef, aspectQName);
|
nodeService.removeAspect(nodeRef, aspectQName);
|
||||||
// aspect is being removed so remove all of its properties from the propsToAdd map
|
|
||||||
TypeDefinitionWrapper w = getOpenCMISDictionaryService().findNodeType(aspectQName);
|
|
||||||
for(PropertyDefinitionWrapper wr : w.getProperties())
|
|
||||||
{
|
|
||||||
String propertyId = wr.getPropertyId();
|
|
||||||
propsToAdd.remove(propertyId);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// add aspects and properties
|
// add aspects and properties
|
||||||
for(QName aspectQName : toAdd)
|
for(QName aspectQName : toAdd)
|
||||||
{
|
{
|
||||||
nodeService.addAspect(nodeRef, aspectQName, null);
|
nodeService.addAspect(nodeRef, aspectQName, null);
|
||||||
|
|
||||||
// get aspect properties
|
|
||||||
AspectDefinition aspectDef = dictionaryService.getAspect(aspectQName);
|
|
||||||
Map<QName, org.alfresco.service.cmr.dictionary.PropertyDefinition> aspectPropDefs = aspectDef.getProperties();
|
|
||||||
TypeDefinitionWrapper w = getOpenCMISDictionaryService().findNodeType(aspectQName);
|
|
||||||
// for each aspect property...
|
|
||||||
for(QName propQName : aspectPropDefs.keySet())
|
|
||||||
{
|
|
||||||
// find CMIS property id
|
|
||||||
PropertyDefinitionWrapper property = w.getPropertyByQName(propQName);
|
|
||||||
String propertyId = property.getPropertyId();
|
|
||||||
if(!propsToAdd.containsKey(propertyId))
|
|
||||||
{
|
|
||||||
TypeDefinitionWrapper propType = property.getOwningType();
|
|
||||||
// CMIS 1.1 secondary types specification requires that all secondary type properties are set
|
|
||||||
// property not included in propsToAdd, add it with null value
|
|
||||||
Pair<TypeDefinitionWrapper, Serializable> pair = new Pair<TypeDefinitionWrapper, Serializable>(propType, null);
|
|
||||||
propsToAdd.put(propertyId, pair);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -3580,9 +3554,9 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
throw new CmisInvalidArgumentException("Property " + propertyId + " is unknown!");
|
throw new CmisInvalidArgumentException("Property " + propertyId + " is unknown!");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Boolean isOnWorkingCopy = checkOutCheckInService.isWorkingCopy(nodeRef);
|
||||||
Updatability updatability = propDef.getPropertyDefinition().getUpdatability();
|
Updatability updatability = propDef.getPropertyDefinition().getUpdatability();
|
||||||
if ((updatability == Updatability.READONLY)
|
if (!isUpdatable(updatability, isOnWorkingCopy))
|
||||||
|| (updatability == Updatability.WHENCHECKEDOUT && !checkOutCheckInService.isWorkingCopy(nodeRef)))
|
|
||||||
{
|
{
|
||||||
throw new CmisInvalidArgumentException("Property " + propertyId + " is read-only!");
|
throw new CmisInvalidArgumentException("Property " + propertyId + " is read-only!");
|
||||||
}
|
}
|
||||||
@@ -3610,7 +3584,7 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
{
|
{
|
||||||
String newName = value.toString();
|
String newName = value.toString();
|
||||||
// If the node is checked out and the name property is set on the working copy, make sure the new name has the working copy format
|
// If the node is checked out and the name property is set on the working copy, make sure the new name has the working copy format
|
||||||
if (checkOutCheckInService.isWorkingCopy(nodeRef))
|
if (isOnWorkingCopy)
|
||||||
{
|
{
|
||||||
String wcLabel = (String)this.nodeService.getProperty(nodeRef, ContentModel.PROP_WORKING_COPY_LABEL);
|
String wcLabel = (String)this.nodeService.getProperty(nodeRef, ContentModel.PROP_WORKING_COPY_LABEL);
|
||||||
if (wcLabel == null)
|
if (wcLabel == null)
|
||||||
@@ -4110,4 +4084,23 @@ public class CMISConnector implements ApplicationContextAware, ApplicationListen
|
|||||||
}
|
}
|
||||||
return renditionMapping;
|
return renditionMapping;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verify if a property is updatable.
|
||||||
|
* @param updatability
|
||||||
|
* @param isOnWorkingCopy
|
||||||
|
* @return
|
||||||
|
*/
|
||||||
|
private boolean isUpdatable(Updatability updatability, Boolean isOnWorkingCopy)
|
||||||
|
{
|
||||||
|
if ((updatability == Updatability.READONLY)
|
||||||
|
|| (updatability == Updatability.WHENCHECKEDOUT && !isOnWorkingCopy))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@@ -33,6 +33,7 @@ import org.alfresco.repo.management.subsystems.ActivateableBean;
|
|||||||
import org.alfresco.repo.security.authentication.AuthenticationComponent.UserNameValidationMode;
|
import org.alfresco.repo.security.authentication.AuthenticationComponent.UserNameValidationMode;
|
||||||
import org.alfresco.repo.tenant.TenantContextHolder;
|
import org.alfresco.repo.tenant.TenantContextHolder;
|
||||||
import org.alfresco.service.cmr.security.PersonService;
|
import org.alfresco.service.cmr.security.PersonService;
|
||||||
|
import org.alfresco.util.GUID;
|
||||||
import org.alfresco.util.Pair;
|
import org.alfresco.util.Pair;
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
@@ -43,6 +44,9 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
AuthenticationComponent authenticationComponent;
|
AuthenticationComponent authenticationComponent;
|
||||||
TicketComponent ticketComponent;
|
TicketComponent ticketComponent;
|
||||||
|
|
||||||
|
/** a serviceInstanceId identifying this unique instance */
|
||||||
|
private String serviceInstanceId;
|
||||||
|
|
||||||
private String domain;
|
private String domain;
|
||||||
private boolean allowsUserCreation = true;
|
private boolean allowsUserCreation = true;
|
||||||
private boolean allowsUserDeletion = true;
|
private boolean allowsUserDeletion = true;
|
||||||
@@ -85,6 +89,8 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
public AuthenticationServiceImpl()
|
public AuthenticationServiceImpl()
|
||||||
{
|
{
|
||||||
super();
|
super();
|
||||||
|
|
||||||
|
this.serviceInstanceId = GUID.generate();
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setTicketComponent(TicketComponent ticketComponent)
|
public void setTicketComponent(TicketComponent ticketComponent)
|
||||||
@@ -124,9 +130,10 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
TenantContextHolder.setTenantDomain(tenant);
|
TenantContextHolder.setTenantDomain(tenant);
|
||||||
if (protectionEnabled)
|
if (protectionEnabled)
|
||||||
{
|
{
|
||||||
if (protectedUsersCache.get(userName) != null)
|
final String protectedUserKey = getProtectedUserKey(userName);
|
||||||
|
if (protectedUsersCache.get(protectedUserKey) != null)
|
||||||
{
|
{
|
||||||
protectedUsersCache.remove(userName);
|
protectedUsersCache.remove(protectedUserKey);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -148,7 +155,8 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
boolean isProtected = false;
|
boolean isProtected = false;
|
||||||
if (protectionEnabled)
|
if (protectionEnabled)
|
||||||
{
|
{
|
||||||
ProtectedUser protectedUser = protectedUsersCache.get(userName);
|
final String protectedUserKey = getProtectedUserKey(userName);
|
||||||
|
ProtectedUser protectedUser = protectedUsersCache.get(protectedUserKey);
|
||||||
if (protectedUser != null)
|
if (protectedUser != null)
|
||||||
{
|
{
|
||||||
long currentTimeStamp = System.currentTimeMillis();
|
long currentTimeStamp = System.currentTimeMillis();
|
||||||
@@ -168,7 +176,8 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
{
|
{
|
||||||
if (protectionEnabled)
|
if (protectionEnabled)
|
||||||
{
|
{
|
||||||
ProtectedUser protectedUser = protectedUsersCache.get(userName);
|
final String protectedUserKey = getProtectedUserKey(userName);
|
||||||
|
ProtectedUser protectedUser = protectedUsersCache.get(protectedUserKey);
|
||||||
if (protectedUser == null)
|
if (protectedUser == null)
|
||||||
{
|
{
|
||||||
protectedUser = new ProtectedUser(userName);
|
protectedUser = new ProtectedUser(userName);
|
||||||
@@ -186,10 +195,18 @@ public class AuthenticationServiceImpl extends AbstractAuthenticationService imp
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
protectedUsersCache.put(userName, protectedUser);
|
protectedUsersCache.put(protectedUserKey, protectedUser);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a key by combining the service instance ID with the username. This are the type of keys maintained by protectedUsersCache map.
|
||||||
|
*/
|
||||||
|
public String getProtectedUserKey(String userName)
|
||||||
|
{
|
||||||
|
return serviceInstanceId + "@@" + userName;
|
||||||
|
}
|
||||||
|
|
||||||
public String getCurrentUserName() throws AuthenticationException
|
public String getCurrentUserName() throws AuthenticationException
|
||||||
{
|
{
|
||||||
return authenticationComponent.getCurrentUserName();
|
return authenticationComponent.getCurrentUserName();
|
||||||
|
@@ -729,7 +729,7 @@ cache.authorizationCache.readBackupData=false
|
|||||||
cache.protectedUsersCache.maxItems=1000
|
cache.protectedUsersCache.maxItems=1000
|
||||||
cache.protectedUsersCache.timeToLiveSeconds=0
|
cache.protectedUsersCache.timeToLiveSeconds=0
|
||||||
cache.protectedUsersCache.maxIdleSeconds=0
|
cache.protectedUsersCache.maxIdleSeconds=0
|
||||||
cache.protectedUsersCache.cluster.type=fully-distributed
|
cache.protectedUsersCache.cluster.type=local
|
||||||
cache.protectedUsersCache.backup-count=1
|
cache.protectedUsersCache.backup-count=1
|
||||||
cache.protectedUsersCache.eviction-policy=LRU
|
cache.protectedUsersCache.eviction-policy=LRU
|
||||||
cache.protectedUsersCache.eviction-percentage=25
|
cache.protectedUsersCache.eviction-percentage=25
|
||||||
|
@@ -50,6 +50,7 @@ import java.util.HashSet;
|
|||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
import java.util.UUID;
|
||||||
|
|
||||||
import org.alfresco.model.ContentModel;
|
import org.alfresco.model.ContentModel;
|
||||||
import org.alfresco.opencmis.dictionary.CMISDictionaryService;
|
import org.alfresco.opencmis.dictionary.CMISDictionaryService;
|
||||||
@@ -1755,9 +1756,13 @@ public class CMISTest
|
|||||||
|
|
||||||
List secondaryTypeIds = currentProperties.getProperties().get(PropertyIds.SECONDARY_OBJECT_TYPE_IDS).getValues();
|
List secondaryTypeIds = currentProperties.getProperties().get(PropertyIds.SECONDARY_OBJECT_TYPE_IDS).getValues();
|
||||||
|
|
||||||
|
assertTrue(secondaryTypeIds.contains(aspectName));
|
||||||
|
|
||||||
secondaryTypeIds.remove(aspectName);
|
secondaryTypeIds.remove(aspectName);
|
||||||
final PropertiesImpl newProperties = new PropertiesImpl();
|
final PropertiesImpl newProperties = new PropertiesImpl();
|
||||||
newProperties.addProperty(new PropertyStringImpl(PropertyIds.SECONDARY_OBJECT_TYPE_IDS, secondaryTypeIds));
|
newProperties.addProperty(new PropertyStringImpl(PropertyIds.SECONDARY_OBJECT_TYPE_IDS, secondaryTypeIds));
|
||||||
|
final String updatedName = "My_new_name_"+UUID.randomUUID().toString();
|
||||||
|
newProperties.replaceProperty(new PropertyStringImpl(PropertyIds.NAME, updatedName));
|
||||||
|
|
||||||
withCmisService(new CmisServiceCallback<Void>()
|
withCmisService(new CmisServiceCallback<Void>()
|
||||||
{
|
{
|
||||||
@@ -1765,6 +1770,8 @@ public class CMISTest
|
|||||||
public Void execute(CmisService cmisService)
|
public Void execute(CmisService cmisService)
|
||||||
{
|
{
|
||||||
Holder<String> latestObjectIdHolder = getHolderOfObjectOfLatestVersion(cmisService, repositoryId, objectIdHolder);
|
Holder<String> latestObjectIdHolder = getHolderOfObjectOfLatestVersion(cmisService, repositoryId, objectIdHolder);
|
||||||
|
// This will result in aspectName being removed
|
||||||
|
// but that shouldn't mean that, for example, a cmis:name prop update gets ignored (MNT-18340)
|
||||||
cmisService.updateProperties(repositoryId, latestObjectIdHolder, null, newProperties, null);
|
cmisService.updateProperties(repositoryId, latestObjectIdHolder, null, newProperties, null);
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
@@ -1775,12 +1782,15 @@ public class CMISTest
|
|||||||
@Override
|
@Override
|
||||||
public Properties execute(CmisService cmisService)
|
public Properties execute(CmisService cmisService)
|
||||||
{
|
{
|
||||||
Properties properties = cmisService.getProperties(repositoryId, objectIdHolder.getValue(), null, null);
|
Holder<String> latestObjectIdHolder = getHolderOfObjectOfLatestVersion(cmisService, repositoryId, objectIdHolder);
|
||||||
|
Properties properties = cmisService.getProperties(repositoryId, latestObjectIdHolder.getValue(), null, null);
|
||||||
return properties;
|
return properties;
|
||||||
}
|
}
|
||||||
}, CmisVersion.CMIS_1_1);
|
}, CmisVersion.CMIS_1_1);
|
||||||
secondaryTypeIds = currentProperties1.getProperties().get(PropertyIds.SECONDARY_OBJECT_TYPE_IDS).getValues();
|
secondaryTypeIds = currentProperties1.getProperties().get(PropertyIds.SECONDARY_OBJECT_TYPE_IDS).getValues();
|
||||||
|
|
||||||
|
assertFalse(secondaryTypeIds.contains(aspectName));
|
||||||
|
assertEquals(updatedName, currentProperties1.getProperties().get(PropertyIds.NAME).getFirstValue());
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -3352,7 +3362,19 @@ public class CMISTest
|
|||||||
|
|
||||||
cmisService.updateProperties(repositoryId, new Holder<String>(fileInfo.getNodeRef().toString()), null, properties, null);
|
cmisService.updateProperties(repositoryId, new Holder<String>(fileInfo.getNodeRef().toString()), null, properties, null);
|
||||||
}
|
}
|
||||||
|
//This extra check was added due to MNT-16641.
|
||||||
|
{
|
||||||
|
PropertiesImpl properties = new PropertiesImpl();
|
||||||
|
properties.addProperty(new PropertyStringImpl(PropertyIds.SECONDARY_OBJECT_TYPE_IDS, "P:cm:lockable"));
|
||||||
|
|
||||||
|
Set<QName> existingAspects = nodeService.getAspects(docs.get(0).getNodeRef());
|
||||||
|
cmisService.updateProperties(repositoryId,new Holder<String>(docs.get(0).getNodeRef().toString()), null, properties, null);
|
||||||
|
Set<QName> updatedAspects = nodeService.getAspects(docs.get(0).getNodeRef());
|
||||||
|
updatedAspects.removeAll(existingAspects);
|
||||||
|
|
||||||
|
assertEquals(ContentModel.ASPECT_LOCKABLE, updatedAspects.iterator().next());
|
||||||
|
|
||||||
|
}
|
||||||
return repositoryId;
|
return repositoryId;
|
||||||
}
|
}
|
||||||
}, CmisVersion.CMIS_1_1);
|
}, CmisVersion.CMIS_1_1);
|
||||||
|
@@ -34,6 +34,7 @@ import java.util.Collection;
|
|||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
|
import static junit.framework.TestCase.assertNotNull;
|
||||||
import static org.junit.Assert.assertEquals;
|
import static org.junit.Assert.assertEquals;
|
||||||
import static org.junit.Assert.assertFalse;
|
import static org.junit.Assert.assertFalse;
|
||||||
import static org.junit.Assert.assertNull;
|
import static org.junit.Assert.assertNull;
|
||||||
@@ -57,6 +58,7 @@ public class AuthenticationServiceImplTest
|
|||||||
private SimpleCache<String, ProtectedUser> cache;
|
private SimpleCache<String, ProtectedUser> cache;
|
||||||
private TicketComponent ticketComponent = mock(TicketComponent.class);
|
private TicketComponent ticketComponent = mock(TicketComponent.class);
|
||||||
private AuthenticationServiceImpl authService;
|
private AuthenticationServiceImpl authService;
|
||||||
|
private AuthenticationServiceImpl authService2;
|
||||||
|
|
||||||
private static final String USERNAME = "username";
|
private static final String USERNAME = "username";
|
||||||
private static final char[] PASSWORD = "password".toCharArray();
|
private static final char[] PASSWORD = "password".toCharArray();
|
||||||
@@ -69,6 +71,11 @@ public class AuthenticationServiceImplTest
|
|||||||
authService.setTicketComponent(ticketComponent);
|
authService.setTicketComponent(ticketComponent);
|
||||||
cache = new MockCache<>();
|
cache = new MockCache<>();
|
||||||
authService.setProtectedUsersCache(cache);
|
authService.setProtectedUsersCache(cache);
|
||||||
|
|
||||||
|
authService2 = new AuthenticationServiceImpl();
|
||||||
|
authService2.setAuthenticationComponent(authenticationComponent);
|
||||||
|
authService2.setTicketComponent(ticketComponent);
|
||||||
|
authService2.setProtectedUsersCache(cache);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -104,7 +111,9 @@ public class AuthenticationServiceImplTest
|
|||||||
}
|
}
|
||||||
verify(authenticationComponent, times(limit)).authenticate(USERNAME, PASSWORD);
|
verify(authenticationComponent, times(limit)).authenticate(USERNAME, PASSWORD);
|
||||||
assertTrue("The user should be protected.", authService.isUserProtected(USERNAME));
|
assertTrue("The user should be protected.", authService.isUserProtected(USERNAME));
|
||||||
assertEquals("The number of recorded logins did not match.", attempts, cache.get(USERNAME).getNumLogins());
|
|
||||||
|
final String protectedUserKey = authService.getProtectedUserKey(USERNAME);
|
||||||
|
assertEquals("The number of recorded logins did not match.", attempts, cache.get(protectedUserKey).getNumLogins());
|
||||||
|
|
||||||
// test that the protection is still in place even if the password is correct
|
// test that the protection is still in place even if the password is correct
|
||||||
doNothing().when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
doNothing().when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
||||||
@@ -118,7 +127,7 @@ public class AuthenticationServiceImplTest
|
|||||||
// normal
|
// normal
|
||||||
}
|
}
|
||||||
verify(authenticationComponent, times(limit)).authenticate(USERNAME, PASSWORD);
|
verify(authenticationComponent, times(limit)).authenticate(USERNAME, PASSWORD);
|
||||||
assertEquals("The number of recorded logins did not match.", attempts + 1, cache.get(USERNAME).getNumLogins());
|
assertEquals("The number of recorded logins did not match.", attempts + 1, cache.get(protectedUserKey).getNumLogins());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -145,11 +154,13 @@ public class AuthenticationServiceImplTest
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
assertTrue("The user should be protected.", authService.isUserProtected(USERNAME));
|
assertTrue("The user should be protected.", authService.isUserProtected(USERNAME));
|
||||||
assertEquals("The number of recorded logins did not match.", attempts, cache.get(USERNAME).getNumLogins());
|
|
||||||
|
final String protectedUserKey = authService.getProtectedUserKey(USERNAME);
|
||||||
|
assertEquals("The number of recorded logins did not match.", attempts, cache.get(protectedUserKey).getNumLogins());
|
||||||
Thread.sleep(timeLimit*1000 + 1);
|
Thread.sleep(timeLimit*1000 + 1);
|
||||||
assertFalse("The user should not be protected any more.", authService.isUserProtected(USERNAME));
|
assertFalse("The user should not be protected any more.", authService.isUserProtected(USERNAME));
|
||||||
assertEquals("The number of recorded logins should stay the same after protection period ends.",
|
assertEquals("The number of recorded logins should stay the same after protection period ends.",
|
||||||
attempts, cache.get(USERNAME).getNumLogins());
|
attempts, cache.get(protectedUserKey).getNumLogins());
|
||||||
|
|
||||||
doNothing().when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
doNothing().when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
||||||
try
|
try
|
||||||
@@ -161,9 +172,78 @@ public class AuthenticationServiceImplTest
|
|||||||
fail("An " + AuthenticationException.class.getName() + " should not be thrown.");
|
fail("An " + AuthenticationException.class.getName() + " should not be thrown.");
|
||||||
}
|
}
|
||||||
assertNull("The user should be removed from the cache after successful login.",
|
assertNull("The user should be removed from the cache after successful login.",
|
||||||
cache.get(USERNAME));
|
cache.get(protectedUserKey));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testAuthChainWorksIfFirstAuthFails() throws Exception
|
||||||
|
{
|
||||||
|
int timeLimit = 1;
|
||||||
|
int attempts = 2;
|
||||||
|
authService.setProtectionPeriodSeconds(timeLimit);
|
||||||
|
authService.setProtectionLimit(attempts);
|
||||||
|
authService.setProtectionEnabled(true);
|
||||||
|
|
||||||
|
authService2.setProtectionPeriodSeconds(timeLimit);
|
||||||
|
authService2.setProtectionLimit(attempts);
|
||||||
|
authService2.setProtectionEnabled(true);
|
||||||
|
|
||||||
|
AuthenticationServiceImpl[] authenticationChain = {authService, authService2};
|
||||||
|
|
||||||
|
doThrow(new AuthenticationException("Bad password"))
|
||||||
|
.when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
||||||
|
|
||||||
|
// Authentication fails on first run.
|
||||||
|
for (int i = 0; i < attempts; i++) {
|
||||||
|
for (AuthenticationServiceImpl authentication : authenticationChain) {
|
||||||
|
try {
|
||||||
|
authentication.authenticate(USERNAME, PASSWORD);
|
||||||
|
fail("An " + AuthenticationException.class.getName() + " should be thrown.");
|
||||||
|
} catch (AuthenticationException ae) {
|
||||||
|
// normal
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for (AuthenticationServiceImpl authentication : authenticationChain)
|
||||||
|
{
|
||||||
|
assertTrue("The user should be protected.", authentication.isUserProtected(USERNAME));
|
||||||
|
}
|
||||||
|
|
||||||
|
Thread.sleep(timeLimit*1000 + 1);
|
||||||
|
|
||||||
|
for (AuthenticationServiceImpl authentication : authenticationChain)
|
||||||
|
{
|
||||||
|
assertFalse("The user should not be protected any more.", authentication.isUserProtected(USERNAME));
|
||||||
|
}
|
||||||
|
|
||||||
|
// Authentication always fails on first authentication service in the chain.
|
||||||
|
try
|
||||||
|
{
|
||||||
|
authenticationChain[0].authenticate(USERNAME, PASSWORD);
|
||||||
|
fail("An " + AuthenticationException.class.getName() + " should be thrown.");
|
||||||
|
} catch (AuthenticationException ae) {
|
||||||
|
// normal
|
||||||
|
}
|
||||||
|
|
||||||
|
// Authentication should succeed on second authentication service in the chain.
|
||||||
|
doNothing().when(authenticationComponent).authenticate(USERNAME, PASSWORD);
|
||||||
|
try
|
||||||
|
{
|
||||||
|
authenticationChain[1].authenticate(USERNAME, PASSWORD);
|
||||||
|
}
|
||||||
|
catch (AuthenticationException ae)
|
||||||
|
{
|
||||||
|
fail("An " + AuthenticationException.class.getName() + " should not be thrown.");
|
||||||
|
}
|
||||||
|
|
||||||
|
assertNotNull("The user should not be removed from the cache for the corresponding authorization service after a failed login.",
|
||||||
|
cache.get(authenticationChain[0].getProtectedUserKey(USERNAME)));
|
||||||
|
assertNull("The user should be removed from the cache for the corresponding authorization service after successful login.",
|
||||||
|
cache.get(authenticationChain[1].getProtectedUserKey(USERNAME)));
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testProtectionDisabledBadPassword()
|
public void testProtectionDisabledBadPassword()
|
||||||
{
|
{
|
||||||
|
Reference in New Issue
Block a user